PREVENTING HACKS THROUGH NULL SESSIONS

All variations of the Windows NT kernel have a major security flaw: They allow a peculiar form of access called a null or anonymous session, which can yield dangerous information about a machine and its SAM (Security Accounts Manager) accounts. SAM is a local security database that stores information about all of a machine's user and group accounts. Discovering a SAM account with administrative privileges would be a hacker's first objective—but getting the name of any account is a big step. With a user name, a hacker has a hope of eventually breaking into the user's account, then jacking up account privileges to the admin level.

There is a reason Windows allows anonymous access. In a trusted environment, this lets Windows NT, 2000, and XP machines see one another's shared folders and attached peripherals via the InterProcess communication share (IPC$). Allowing IPC$ is a must for some simple peer networks.

But IPC$ also allows entry to client machines. A hacker who types

net use \\yourcomputer\ipc$ "" /user:""
at a command line (where yourcomputer is either your internal IP address or your NetBIOS machine name) is assigned a blank name and password and connected to your PC. Establishing a null session like this does not allow control of your machine, but it does reveal all the user names on your system, the groups your system belongs to, the rights it has, and any shares available.

By setting or modifying a value in the Registry, you can restrict anonymous access. For Windows NT or 2000, go to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa. Look in the right-hand pane for the DWORD value RestrictAnonymous. If you don't find it, right-click in the right-hand pane, choose Edit | New | DWORD Value, and name the value RestrictAnonymous.

In Windows NT with Service Pack 3 or in Windows 2000, the data for this value can be 0, 1, or 2 (we'll get to Windows XP in a moment). If it's 2, you're all set. No information can leak via a null session, because there is no way to establish one. If the value is 1 (all that was allowed before Windows NT with SP3), some tools can still enumerate information. If it is 0, your machine is wide open. Double-click on the value and set its data to 1 or 2, then restart the system.

Although 2 is preferable, it may cause connectivity and sharing problems when used outside of an environment running only Windows 2000. For example, down-level clients won't be able to establish access to the domain the Windows 2000 machine is hosting; that effectively closes those clients off from the network's resources.

Windows XP solves the problems that a setting of 2 can introduce by adding more flexibility to null-session restrictions. In addition to RestrictAnonymous, Windows XP has two other DWORD values you can modify—RestrictAnonymousSAM and EveryoneIncludesAnonymous. Set RestrictAnonymous to 1 to limit access to share information, and set RestrictAnonymousSAM to 1 to prevent enumeration of SAM accounts. Finally, assign EveryoneIncludesAnonymous a value of 0, which will keep null-session users from having any rights. This still allows the establishment of a null session, so basic network resources such as files and printers remain available to all trusted users, but nothing will leak.
APPLY SAFETY,PREVENT HACKING! :-)

GOOGLE TALK TWEAKS




Google talk is the recent craze for chatting.Here r all the tricks wch i found while googling to make my chat sessions better!

Registry Tweaks:


You can edit most settings by opening regedit (start -> regedit),
and navigating to the key HKEY_CURRENT_USER\Software\Google\Google Talk.
The "Google/Google Talk" key has several sub-keys that hold different option values:

Accounts: This one has subkeys for each different account that has logged in on the client. These keys have different values that store the username, password and connection options.

Autoupdate: Stores the current version information. When the client checks for updates it compares Google's response with these values. If an update is needed, it will download and update the new version.

Options: This is the most interesting part, where most of the current hacks should be used (keep reading).

Process: Stores the process ID. Probably used by Google Talk to detect if it's already running or not.

1.) HKEY_CURRENT_USER\Software\Google\Google Talk\Options\show_pin
If 1, shows a "pin" next to the minimize button that keeps the windows on top of all the other open windows when clicked.

2.)HKEY_CURRENT_USER\Software\Google\Google Talk\Options\view_show_taskbutton
If 0, hides the taskbar button, and leaves the tray icon only, when the window is shown

3.)HKEY_CURRENT_USER\Software\Google\Google Talk\Options\away_inactive
If 1, status will be set as Away after the specified number of minutes.

4.)HKEY_CURRENT_USER\Software\Google\Google Talk\Options\away_screensaver
If 1, status will be set as Away after the specified number of minutes.

5.)HKEY_CURRENT_USER\Software\Google\Google Talk\Options\inactive_minutes
Number of inactive minutes to become away if auto-away is on.



More Tips & Tricks



Change the font size - While holding the control key, move the scroll wheel on your mouse either up or down. This trick works while being focused in either the read or write area.


Insert line breaks - If you want to have a message that spans multiple paragraphs, just hold shift and hit enter. You can add as many new lines as you want to create.


Bold Text - To write something bold, you can use an asterisk before and after the word, like *this*.

Italic Text - To use italics, use an underscore before an after the word, like _this_ .


Switch windows - Hitting tab will cycle through open windows. It will select minimized conversations, to expand them just hit enter. If you just want to cycle through IM's and don't care about the buddy list, control-tab will do that and will automatically expand a minimized conversation if you settle on one.


Invitation Tips - You don’t need to say Yes or No when someone wants to add you as a friend; you can simply ignore it, the request will go away. (On the other hand, someone with whom you chat often will automatically turn to be your friend, unless you disable this in the options). ]


Show Hyperlinks - You can show your homepage or blog URL simply by entering the it in your away message (at the top of the main window). It will automatically turn to a link visible to others.



A message can be 32767 characters long.


How to Conference Calls :

What you need to do to have conference calls: Open up a copy of Google Talk on all computers with which you wish to conference. After one copy is opened make a new shortcut for Google Talk but at the end of it add /nomutex. If you installed it to the default folder then your shortcut should read "C:\Program Files\Google\Google Talk\googletalk.exe" /nomutex. Open 2nd instances of the software on every user's computer. After this start a chain: User 1 should connect on one instance to user 2. User 2 will connect on his second instance to user 3. User 3 will connect using his second instance back to user 1. With this chain everyone is connected to everyone.

Nickname & Status Message :

You can't change your nickname in a way that other people will see it change. Every nickname in the Google Talk contactlist is the part that is before @gmail.com (only the alphabetical characters are used) or the name you chosen for your GMail account. To change the nickname need to go to your Gmail account and change the name there. Choose Settings, Accounts, and then Edit info. Click on the second radio button, and enter your custom name. As a result all of your emails will have that nick as well, there is no way to seperate the two. You can add a website in your custom message, it will be clickable when someone opens a conversation window with you.

Contacts :


You don't need to say Yes or No when someone wants to add you as a friend; you can simply ignore it, the request will go away. (On the other hand, someone with whom you chat often will automatically turn to be your friend, unless you disable this).
The Gmail account 'user@gmail.com' can't be invited as your friend.

Play Music :


It's possible to broadcast music, MP3, etc.. through Google Talk.
Unplug your microphone. Double click on the speaker icon in the lower right corner. This will open up "Volume Control". Select "Options" and then "Properties". Then check the button next to "Recording" then click OK. You may also have to change your setting under Mixer Device. Now the Recording Control screen should be up. On my computer I selected "Wave Out Mix". Click on the green phone in Google Talk and call your friend.



Keyboard Shortcuts

Ctrl + E - It centralizes the selected text, or the current line.
Ctrl + R - It justifies to the right the selected text, or the current line.
Ctrl + L - It justifies to the left the selected text, or the current line.
Ctrl + I - The same thing does that Tab.
Tab - It is giving the area to each of the windows opened by Google Talk.
Ctrl + Tab - The same thing does that Shift + Tab .
Shift + Tab - The same thing does that Tab but in reverse.
Ctrl + Shift + L -Switch between points, numbers, letters, capital letters, roman numbers and capital roman numbers
Ctrl + 1 (KeyPad) - It does a simple space between the lines.
Ctrl + 2 (KeyPad) - It does a double space between the lines.
Ctrl + 5 (KeyPad) - A space does 1.5 between the lines.
Ctrl + 1 (NumPad) - It goes at the end of the last line.
Ctrl + 7 (NumPad) - It goes at the begin of the last line.
Ctrl + F4 - It closes the current window.
Alt + F4 - It closes the current window.
Alt + Esc - It Minimize all the windows.
Windows + ESC - Open Google Talk (if it's minimized, or in the tray)
F9 - Open Gmail to send an email to the current contact.
F11 - It initiates a telephonic call with your friend.
F12 - It cancels a telephonic call.
Esc - It closes the current window.



Use multiple identities on Google Talk


Want to run Google Talk with multiple Gmail identities? If you have several Google Gmail accounts you also may want to run multiple instances of Google Talk This is especially important for families that share a single PC. Nothing worse than a family member signing you out so they can sign in under their own account!
Basically, to have "Google Polygamy" you need to run Google Talk with the following switch: /nomutex
Step 1: Right-click on the desktop
Step 2: Select New
Step 3: Select Shortcut
Step 4: Paste this into the text box:
"c:\program files\google\google talk\googletalk.exe" /nomutex
Step 5: Click Next and choose a shortcut name such as Google Talk1, Google Talk2, or something related to your Gmail account for easy remembering which account is which.
Step 6: Click OK a few times.

Use Google Talk via a Web Browser


You want to use Google Talk anywhere ? Follow these guidelines :)
Step 1: Opens your favorite web browser at the following address :
http://www.webjabber.net:8080/jim/
Step 2: Follow the instructions of the Page.
Step 3: You can talk with your friends
Google's Secret Command-Line Parameters
There are a few secret parameters you can add to Google Talk and make it function differently.
The most important, I think, is /nomutex, which allows you to run more than one instance of GT. Here are the others:
/nomutex: allows you to open more than one instance of Google Talk
/autostart: when Google Talk is run with this parameter, it will check the registry settings to see if it needs to be started or not. If the "Start automatically with Windows" option is unchecked, it won't start.
/forcestart: same as /autostart, but forces it to start no matter what option was set.
/S upgrade: Used when upgrading Google Talk
/register: registers Google Talk in the registry, includig the GMail Compose method.
/checkupdate: check for newer versions
/plaintextauth: uses plain authentication mechanism instead then Google's GAIA mechanism. Used for testing the plain method on Google's servers.
/nogaiaauth: disables GAIA authentication method. The same as above.
/factoryreset: set settings back to default.
/gaiaserver servername.com: uses a different GAIA server to connect to Google Talk. Used for debug purposes only, there are no other known GAIA servers.
/mailto email@host.com: send an email with Gmail
/diag: start Google Talk in diagnostic mode
/log: probably has something to do with the diagnostic logging
/unregister: ?
/embedding: ?
To add these, open up your GT shortcut, and where it says "Target:" add one or more of these inside the quotations, but after the .exe part.


Command Line stuff


There are a few secret parameters you can add to Google Talk and make it function differently. The most important, I think, is /nomutex, which allows you to run more than one instance of GT. He Talk is run with this parameter, it will check the registry settings to see if it needs to be started or not. If the "Start automatically with Windows" option is unchecked, it won't start.
/forcestart: same as /autostart, but forces it to start no matter what option was set.
/S upgrade: Used when upgrading Google Talk
/register: registers Google Talk in the registry, includig the GMail Compose method.
/checkupdate: check for newer versions
/plaintextauth: uses plain authentication mechanism instead then Google's GAIA mechanism. Used for testing the plain method on Google's servers.
/nogaiaauth: disables GAIA authentication method. The same as above.
/factoryreset: set settings back to default.
/gaiaserver servername.com: uses a different GAIA server to connect to Google Talk. Used for debug purposes only, there are no other known GAIA servers.
/mailto email@host.com: send an email with Gmail
/diag: start Google Talk in diagnostic mode
/log: probably has something to do with the diagnostic logging
/unregister: ?
/embedding: ? To add these, open up your GT shortcut, and where it says "Target:" add one or more of these inside the quotations, but after the .exe part. ere are the others:
/nomutex: allows you to open more than one instance of Google Talk
/autostart: when Google


Emotions :



All these emotions appears in color in a conversation : (but having them in an image would be better, like iChat or MSN)
:-|
:-O
:-x
:-P
:-D
;-)
:-(
:-)
B-)
:'(
:|
:O
:x
:P
:D
:)
:(
:)


Did u like the stuff..keep posting comments!!

RapidShare Cracking

1>Simply Copy the CODE given below

@echo off
echo ipconfig /flushdns
ipconfig /flushdns
echo ipconfig /release
ipconfig /release
echo ipconfig /renew
ipconfig /renew
exit

2>>Open Command prompt. ( run ->cmd )

3>>Paste the Content There. [ Hope u know how to paste on the cmd Prompt ]

4>>Now try the rapidshare link again and it wont ask you to Wait for more than ONE minute.

Change Yahoo messenger title bar

You can change the yahoo messenger title bar...
For this just find the folder messenger in the drive in which the messenger is installed. Then search a file named "ymsgr". In this file just go to the end and write the following code:
[APP TITLE]
CAPTION=aman
Here you can write any name in place of aman... then see the fun.... You can have your own name being placed in yahoo messenger title bar.

Enable Right Clicks on The Sites Dat Disable it

Lots of web sites have disabled the right click function of the mouse button... it's really, really annoying. This is done so that you don't steal (via right-click->save picture) their photos or images or any other goodies. Unfortunately, it disables ALL right-click functionality: copy, paste, open in new window.

It's easy to change, assuming your using IE 6:
Click "Tools"->"Internet Options"
Click the "Security" tab
Click "Custom Level"
Scroll down to the "Scripting" section
Set "Active Scripting" to "disable"
Click "Ok" a couple of times.

You'll probably want to turn this back to "enable" when your done... 'cause generally the javascript enhances a website.

How Password protected sites are hacked-stay safe

Here are many ways to defeat java-script protected websites. Some are very simplistic, such as hitting
[ctl-alt-del ]when the password box is displayed, to simply turning offjava capability, which will dump you into the default page.You can try manually searching for other directories, by typing the directory name into the url address box of your browser, ie: you want access to www.target.com .

Try typing www.target.com/images .(almost ever y web site has an images directory) This will put you into the images directory,and give you a text list of all the images located there. Often, the title of an image will give you a clue to the name of another directory. ie: in www.target.com/images, there is a .gif named gamestitle.gif . There is a good chance then, that there is a 'games' directory on the site,so you would then type in www.target.com/games, and if it is a valid directory, you again get a text listing of all the files available there.

For a more automated approach, use a program like WEB SNAKE from anawave, or Web Wacker. These programs will create a mirror image of an entire web site, showing all director ies,or even mirror a complete server. They are indispensable for locating hidden files and directories.What do you do if you can't get past an opening "PasswordRequired" box? . First do an WHOIS Lookup for the site. In our example, www.target.com . We find it's hosted by www.host.com at 100.100.100. 1.

We then go to 100.100.100.1, and then launch \Web Snake, and mirror the entire server. Set Web Snake to NOT download anything over about 20K. (not many HTML pages are bigger than this) This speeds things up some, and keeps you from getting a lot of files and images you don't care about. This can take a long time, so consider running it right before bed time. Once you have an image of the entire server, you look through the directories listed, and find /target. When we open that directory, we find its contents, and all of its sub-directories listed. Let's say we find /target/games/zip/zipindex.html . This would be the index page that would be displayed had you gone through the password procedure, and allowed it to redirect you here.By simply typing in the url www.target.com/games/zip/zipindex.html you will be on the index page and ready to follow the links for downloading

Set Processes Priority

Follow this tip to increase the priority of active processes, this will result in prioritisation of processes using the CPU.

Hit CTRL-SHIFT-ESC
Go to the second tab called Processes, right click on one of the active processes, you will see the Set Priority option

For example, Run your CDwriter program , set the priority higher, and guess what, no crashed CD’s

Hide ur folders...Disguise them to "Recycle Bin"

Rename any folder with extension {645FF040-5081-101B-9F08-00AA002F954E}
eg,
if u've a folder games
press F2,
then type, "games.{645FF040-5081-101B-9F08-00AA002F954E}"
c the magic....
then 2 get to original form,
remove the extension using
"ren games.{645FF040-5081-101B-9F08-00AA002F954E} games" in dos or as a bat file


n u are done..

System information of xp

While previous versions of Windows were coy about how long they went
between boots, XP is positively proud of its stamina.
Go to the Command Prompt in the Accessories menu from the All Programs start button option, and then type 'systeminfo'. The computer will produce a lot of useful info, including the uptime.
If you want to keep these, type 'systeminfo > info.txt'. This creates a file called info.txt you can look at later with Notepad. (Professional Edition only).

AUTO DELETE TEMPORARY FOLDER.!!

U can do this by 2 methods!

1>>In the start menu click run & type %temp%.This opens ur temp folder n den u can erase it neatly. still try another 1 too..

2>>First go into gpedit.msc
Next select -> Computer Configuration/Administrative Templates/Windows Components/Terminal Services/Temporary Folder
Then right click "Do Not Delete Temp Folder Upon Exit"
Go to properties and hit disable.
Now next time Windows puts a temp file in that folder it will automatically delete it when its done!
NB: GPEDIT (Group Policy Editor) is only available in XP Pro.

Notepad tricks

1>>"where's my text?"
Do the following:
Step 1: Open Notepad
Step 2: Write following line in the notepad.
"this app can break" without the quotes.
Step 3: Save this file as xxx.txt
Step 4: Close the notepad.
Step 5: Open the file again.


or

1> Open Notepad
2> Enter four words separated by spaces, wherein the first word has 4 letters, the next two have three letters, and the last word has five letters
3> DON'T hit enter at the end of the line.
4> Save the file.
5> Close Notepad.
6> Reopen Notepad.
7> Open the file you just saved.

or

Open a note pad
type Bush hid the facts
save that file,
close it
again open and see...

what do u see in all the cases.The text u rote has been replaced by the squares..

2>>world trade centre trick

Did you know that the flight number of the plane that had hit WTC ...on
9/11 was Q33N ....Open your Notepad in ur computer and type the flight
number i.e Q33N... Increase the Font Size to 72, Change the Font to
Wingdings. U will be amazed by the findings.
The trick is a tribute to the people who died in the accident!


3>>Make ur Notepad a diary !!

Sometimes we want to insert current data and time, whenever we open the file in the notepad. If you are a lazy person like me, who don’t like to press F5 whenever you open a notepad. Then here is a trick to avoid this. Just add a .LOG in the first line of your text file and close it.
Whenever you open the file with that text in the first line in the notepad, it will insert the current date and time at the end of the file. You can start entering your text after that.


WHY?

The reason this happens:

In notepad, any other 4-3-3-5 letter word combo will have the same results.
It is all to do with a limitation in Windows. Text files containing Unicode UTF-16-encoded Unicode are supposed to start with a "Byte-Order Mark" (BOM), which is a two-byte flag that tells a reader how the following UTF-16 data is encoded.

1) You are saving to 8-bit Extended ASCII (Look at the Save As / Encoding format)
2) You are reading from 16-bit UNICODE (You guessed it, look at the Save As / Encoding format)
This is why the 18 8-bit characters are being displayed as 9 (obviously not supported by your codepage) 16-bit UNICODE characters

~ cheers ~

Remove Stored username and Passwords !

To remove the Stored User Names and Passwords from your system, try this:
Click Start, Run and type Control keymgr.dll
Remove the entries from the list.
The other ways to access this dialog are:
Type Control Userpasswords2 in RUN box, click Advanced, Manage Passwords
-or-
From Control Panel, select your User Account, click Manage your network passwords

It Works!!!

SPEED UP UR ACROBAT READER

Do u get irritated when acrobat reader takes 5/10 seconds to load when you want to open a pdf document. There is a way to speed up the loading.

1. Go to the installation folder of acrobat reader
(C:\program files\adobe\acrobat\reader\.. whatever)

2. Move all the files and folders from the "plugins" directory to the "Optional" directory. (I repeat.. cut and paste the files NOT copy & paste).

Also make sure that acrobat reader is not open else it will lock the files and not allow you to move the files).

Now your acrobat reader will load very fast
and almost as good as notepad..

Some more xp tweaks!

In some previous posts,i hv given some useful xp tips.here r more!

1>>How to login as administrator if you don't see it available tip:

Unless and until you have run into issues and fixing XP (underwhich case you have to go to Safe Mode to login as Administrator), you can get to administrator screen by simply pressing CTRL+ALT+DELETE twice at the main screen.

2>>Are you missing icons Tip:
Are you missing icons? You may be wondering where all the icons from your desktop are in Windows XP? Well if you're like me, you like to have at least My Computer, My Network Places, and My Documents on the your desktop.
You need to:
* Right-click on the desktop, and then click Properties.
* Click the Desktop tab and then click on Customize Desktop.
* Put a check mark in the box next to My Document, My Computer, My Network Places, or Internet Explorer, to add those familiar icons to your desktop

3>>Speedup boot up sequence by defragmenting all key boot files tip:
Open Registry by going to START-RUN and typing REGEDIT. Navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Dfrg\BootOptimizeFunction. In right hand panel look for Enable. Right click on it and set it 'Y' for enable. This is the way I have it set on my computer. This will help speedup boot time.

4>>Use a Shortcut to Local Area Network Connection Information Tip:
Here's something new in Windows XP, instead of using the command line program and typing ipconfig to get local area network information, you can try using the following shortcut:
* Click on Start, point to Connect to, and then click Show All Connections.
* Right–click the connection you want information about, and then click Status.
* In the connection Properties dialog box, click the Support tab.
* For more information, click on the Advanced tab.

To automatically enable the status monitor each time the connection is active, in the connection Properties dialog box, select the Show icon in taskbar notification area when connected check box.

5>>Do you know you can have Virtual Desktops (like in Linux) with PowerToys ?
If you have powertoys installed on Windows XP Its available for free at Microsoft download webpage. It is very easy to enable Microsoft Virtual Desktop Feature. Simply right click on the Start Panel Bar also called TaskBar, Click on Tool Bar and select Desktop manager.
You would see a set of 5 icons placed on the right portion of the TAskBar. Click on number 1 to 4 to go to any of the desktops. Now you have have four different Active Desktops.
NB:You may see a little degradation in performance.

FOR MORE EXCITING TRICKS KEEP POSTING COMMENTS!!!

Improve shutdown time

Close apps automatically & quickly at shutdown tip:

Open Registry by going to START-RUN and typing REGEDIT. Navigate to HKEY_CURRENT_USER\CONTROL PANEL\DESKTOP and look for AutoEndTasks. On my computer default value is 0. Change it to 1. Thats all. Further more you can reduce the time it takes for Windows to issue kill directive to all active/hung applications.
In doing this only constraint that you should make sure exists is that "Hung App Timeout" is greater than "Wait To KillApp Timeout". Change the values of "Wait To Kill App Timeout" to say 3500 (since default value for "Hung App Timeout" 5000 and for Wait To Kill App Timeout" is 20000)

Remove shared documents folder from My Computer window

Some people don't like shared documents folder option. If you are one of that, here is a trick to remove it.
Open registry editor by going to START-RUN and entering regedit.
Once in registry, navigate to key HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Explorer \ My Computer \ NameSpace \ DelegateFolders
You must see a sub-key named {59031a47-3f72-44a7-89c5-5595fe6b30ee}. If you delete this key, you have effectively removed the my shared documents folder.

Remove recycle bin from your desktop

Open Regedit by going to START - RUN and type Regedit and hit enter. Then you should navigate to following entry in registry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\
Desktop\NameSpace\{645FF040-5081-101B-9F08-00AA002F954E} and delete it. This action removes recycle bin from your desktop.

Compress drive to save disk space

Its not possible to increase ur memory size but u can compress ur data to save ur disk space, this feature is available in NTFS drive..
if u have a fat or fat32 drive, u can convert it to ntfs by running a command on dos:
for c drive:
convert c:/fs:ntfs
for d drive:
convert d:/fs:ntfs
for e drive:
convert e:/fs:ntfs
run the command similarly if u have more drive...

Compresing data in NTFS

* open my computer
* select any drive(drive with NTFS format)
* right click and select properties
* click on general tab
* select "compress drive to save disk space"
* Apply and OK

ur data will remain safe...

Disabling Scandisk

When Windows is not shut down correctly, it will perform an AutoCheck
using CHKDSK on the next restart.

AutoCheck is executed after a short time delay. AutoCheck can be
disabled or delayed by tweaking a few Registry settings.
Run ‘Regedit’ from ‘Start Menu|Run...’
Go to ‘HKEY_LOCAL_MACHINE|SYSTE
M|CurrentControlSet|Control|Session
Manager’.
Create a new DWORD value, or
modify the existing value, called
“AutoChkTimeOut” and set it according
to the value data below.
Value Name: AutoChkTimeOut.
Data Type: REG_DWORD (DWORD Value).
Value Data: Time in Seconds or 0 to disable
(default = 10).
Exit your registry, you may need to
restart or log out of Windows for the
change to take effect.

IP ADDRESS

Many newbies ask me wat is an ip address?once again i hv tried to describe briefly the basic concepts behind ip's..
An IP address is a number that can uniquely identify any computer on the Internet. With the current Internet protocol (IPv4), an IP address is a 32-bit number. That means that as a binary number, it would be stored as 32 ones and zeroes. There are 4,294,967,296 possible IP addresses. However, we humans tend to split IP addresses into four 8-bit numbers, express these numbers using our decimal number system, and separate them with dots. With 8-bit numbers, each number must be a whole number in the range 0 to 255, inclusive. For example, an IP address of 2,071,690,107 would probably be expressed as 123.123.123.123 (example only). Some people might express an IP address in hexadecimal as well (7B7B7B7Bh in this case). The dotted IP address is by far the most common, however. As the Internet grows, plans are being made to increase the size of IP addresses. (The "next" Internet protocol, IPv6, uses 128-bit IP addresses.) The problem with that, of course, is that quite a few Internet protocols would need to be rewritten, since they are designed to work with 32-bit IP addresses. This includes the Internet Protocol itself (IP). Thankfully, Internet packets include an IP version flag, so it would be possible to have both old and new implementations of the IP communicate with each other. (The newer implementation would use the older protocol when communicating with older implementations. Implementations of the IP would know whether a computer was using the older or newer protocol from the version flag. Unfortunately, older implementations would not be able to access anything outside of the 32-bit IP range.) IP addresses can be statically or dynamically allocated. Statically allocated IP addresses always refer to the same computer. However, dynamically allocated IP addresses can refer to different computers at different times. For example, if you have a dial-up Internet connection, your IP address doesn't become unused when you hang up- it is allocated to someone else. When you reconnect, you are allocated a new IP address. This is dynamic allocation.
Hope the info was helpful.For any queries pls post comments!

Make xp genuine without any software

These are instructions on how to crack the latest version of Windows XP with Service Pack 2 that uses the registration key: JD3T2-QH36R-X7W2W-7R3XT-DVRPQ.
****IT WILL WORK WITH OTHER VERSIONS OF WINDOWS XP but not all! ****This will allow you to bypass the Microsoft Genuine Validation thingythis method works better than many others i've tried before. forget the cracks and injectors etc... this is the BEST WAY:

1) start > run > "regedit" (without the quotes of course)

2) go to the key:HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\Windows NT\CurrentVersion\WPAEvents\OOBETimer...and doubleclick on it. Then change some of the value data to ANYTHING ELSE...delete some, add some letters, I don't care...just change it!now close out regedit.

3) go to start > run > "%systemroot%\system32\oobe\msoobe.exe /a" (again, dont type the quotes)

4) the activation screen will come up, click on register over telephone, then click on CHANGE PRODUCT KEY, enter in this key: JG28K-H9Q7X-BH6W4-3PDCQ-6XBFJ.Now you can dl all the updates without activating, and the Genuine Microsoft Validation thingy won't bug you no more!!

Automatically Close Non-Responding Applications on Shutdown

This is a very useful registry tweak..Start/Run/Regedit/HKEY_USERS/DEFAULT/Control Panel/DesktopValue Name: AutoEndTasks, Data Type: REG_SZ (String Value), Value Data: (0 = disabled, 1 = enabled). Modify the value of 'AutoEndTasks' to equal '1' to automatically end tasks or '0' to prompt for action.
Note: This change will affect all users but the value can also be changed on a user-by-user basis by modifying [HKEY_CURRENT_USER\Control Panel\Desktop] with the same values

nokia secret codes

On the main screen
type :-

*#06# for checking the IMEI(International Mobile Equipment Identity).
*#7780# reset to factory settings.
*#67705646# This will clear the LCD display (operator logo).
*#0000# To view software version.
*#2820# Bluetooth device address.
*#746025625# Sim clock allowed status.
*#62209526# - Display the MAC address of the WLAN adapter.This is available only in the newer devices that support WLAN
#pw+1234567890+1# Shows if sim have restrictions.
*#92702689# - takes you to a secret menu where youmay find some of the information below:
1. Displays Serial Number.
2. Displays the Month and Year of Manufacture
3. Displays (if there) the date where the phone was purchased (MMYY)
4. Displays the date of the last repair - if found (0000)
5. Shows life timer of phone (time passes since last start)
*#3370# - Enhanced Full Rate Codec (EFR) activation.Increase signal strength, better signal reception.It also help if u want to use GPRS and the service isnot responding or too slow.Phone battery will drain faster though.
*#3370* - (EFR) deactivation. Phone will automatically restart.Increase battery life by 30% because phone receivesless signal from network.
*#4720# - Half Rate Codec activation.
*#4720* - Half Rate Codec deactivation. The phone will automatically restartIf you forgot wallet code for Nokia S60 phone,use this code reset:
*#7370925538#Note, your data in the wallet will be erased.Phone will ask you the lock code.Default lock code is:12345Press *#3925538# to delete the contents and code of wallet.Unlock service provider: Insert sim, turn phone on and pressvol up(arrow keys) for 3 seconds, should say pin code.Press C,then press * message should flash, press * again and 04*pin*pin*pin#*#7328748263373738# resets security code.Default security code is 12345

Uninstalling Windows Messenger

Both Windows Messenger and MSN Messenger are useful tool, not only for chatting with friends and family, but also for video conferencing with friend from around the world. Unfortunately, not everyone appreciates the enormous value of this kind of message service. Therefore, many user prefer to remove the application from their pc's altogether. It should be noted that once Windows Messenger is removed you will not have access to Remote Assistance (unless you have MSN Messenger), Whiteboard and Application Sharing.
MSN Messenger is, by far, the easiest of the message services to remove. After all, all that is required is its removal via Windows Add and Remove Programs option. Windows messenger, on the other hand, requires a rather different approach, depending upon whether you have Windows XP Service pack 1 install or not. The two options are outlined below.
Removal of Windows Messenger from Windows XP that hasn't been updated with Service Pack 1 and Service Pack 2
1/ Click the Start button
2/ Next click Run
3/ In the Run dialog box type: RunDll32 advpack.dll,LaunchINFSection %windir%\inf\msmsgs.inf,BLC.Remove
4/ You may need to restart your pc before the changes take effect.
Removal of Windows Messenger from Windows XP with Windows XP Service Pack 1 and Service Pack 2 Installed
1/ Click the Start button
2/ From the Start Menu click Control Panel
3/ In the Control panel window click the Add/Remove Icon
4/ On the Left hand pane of the Add/Remove window you will see an Icon marked 'Add/Remove Windows Components'
5/ Click on the Add/Remove Windows components Icon
6/ Scroll down the list that appears until you come to the option marked Windows Messenger
7/ To Disable Windows Messenger remove the tick from the box on the left of the option
8/ Now click the Next button
9/ The Windows Component Wizard will no update its settings
10/ After updating the Completing the Windows Component Wizard window will appear
11/ Now click Finish
12/ Finally Reboot your pc for the changes to take place....

old trick to see Who is Invisible in Yahoo! messenger!!

It is quite Easy to Find who is Invisible in Yahoo! Messenger.
Open a chat window with whom you want to be find Invisible and load the 'DOODLE' IMvironment.
Just wait for a minute or Sometime..It depends upon your connection speed.
If the IMvironment loads,your buddy is Online!!

How someone's computer is hacked through yahoo messenger

1) Open Command Prompt. Have some one on yahoo messenger send you a file; while the file is sending, in command prompt type -> netstat -an press enter

2)it will show alll Active Connections on your computer, in there under foreign ip for a number thats ends in 5050. this is the persons ip adress who is sending you the file

3)Now type : net use: h \\ (the person's ip adress)\shareddocs push enter wait for message to show up

4)If it is successful you should get a message saying command prompt was successful. If you get a error message than your attempt has failed, probably because the person has security measures in place to prevent hacking.

5)if you get the message that says command was successful, than go to my computer. There you will see a file named "shareddocs on (the name of your computer)" open this fileyou are now connected to that person's computer.

ENABLE HIBERNATE OPTION

Start button -> Control Panel -> Power Options -> Hibernate tab -> check Enable hibernate support box -> Apply/OK -> reboot.

To put your comp. under hibernate option click shut down and then press 'shift'. a new hibernate option will appear, click on it and hibernate oiption will get enabled.

Speed up xp

To disable unneeded startup services for a safer, faster XP, use the "Services" Admin Tool (Control Panel > Administrative Tools > Services). If you are a single user of a non-networked machine, you can disable the following items, with no ill effect.

Alerter
Clipbook
Computer Browser
Fast User Switching
Human Interface Access Devices
Indexing Service (Slows the hard drive down)
Messenger
Net Logon (unnecessary unless networked on a Domain)
Netmeeting Remote Desktop Sharing (disabled for extra security)
Remote Desktop Help Session Manager (disabled for extra security)
Remote Procedure Call Locator
Remote Registry (disabled for extra security)
Routing & Remote Access (disabled for extra security)
Server SSDP Discovery Service (this is for the utterly pointless "Universal P'n'P", & leaves TCP Port 5000 wide open)
TCP/IP NetBIOS Helper Telnet (disabled for extra security)
Universal Plug and Play Device Host
Upload Manager
Windows Time
Wireless Zero Configuration (for wireless networks)
Workstation

Disable cd autorun

1) Click Start, Run and enter GPEDIT.MSC

2) Go to- Computer Configuration, Administrative Templates, System.

3) Locate the entry for Turn autoplay off and modify it as you desire.

website hack through sql injection

The technique of sql injection is pretty old but still u can hack some sites through this method.If you have some html and javascript knowledge then you can easily access some password protected websites. So you want to know how??

keep reading.....
1. Open the website you want to hack. Provide wrong username-password in its log in form.
(e.g : Username : me and Password: ' or 1=1 --)
An error will occur saying wrong username or password. Now be prepared
Your experiment starts from here...

2. Right click anywhere on that error page, go to view page source.

3. There you can see the html codings with javascripts.

4. There you find somewhat like this <_form action="..login....">
< =..login....>

5. Before this login information <=__LOGIN> copy the url of the site in which you are: (e.g :"<_form..........action=http://www.targetwebsite.com/login.......><..........=HTTP: com="">")<..........=HTTP: com="">
6. Then delete the javascript from the above that validates your information in the server.(Do this very carefully, ur success to hack the site depends upon this i.e how efficiently you delete the javascripts that validate ur account information)

7. Then take a close look for "<_input name="password" type="password">"[without quotes] -> replace "<_type=text> " there <=TEXT>instead of "<_"<=TEXT><=>. See there if maxlength of password is less than 11 then increase it to 11 (e.g : if
8. Just go to file then save as and save it any where in your hardisk with name ext.html.

9. Reopen your target web page by double clicking 'chan.html' file that you saved in your
harddisk earlier.

10. U see that some changes in current page as compared to original One. Don't get worried.

11. Provide any username[e.g:hacker] and password[e.g:' or 1=1 --]
Congrats!!!!!! You have successfully cracked the above website and entered into the account of Ist user saved in the server's database.

but hey guys dnt misuse!laws r meant to be broken but they also save us!(:->

DOS COMMANDS

There are some hidden dos commands which u can't recognize by typing help in cmd.here
all the dos commands r discussed in brief:



ANSI.SYS
Defines functions that change display graphics, control cursor movement, and reassign keys.


APPEND
Causes MS-DOS to look in other directories when editing a file or running a command.


ARP
Displays, adds, and removes arp information from network devices.

ASSIGN
Assign a drive letter to an alternate letter.

ASSOC
View the file associations.

AT
Schedule a time to execute commands or programs.

ATMADM
Lists connections and addresses seen by Windows ATM call manager.

BATCH
Recovery console command that executes a series of commands in a file.

BOOTCFG
Recovery console command that allows a user to view, modify, and rebuild the boot.ini

BREAK
Enable / disable CTRL + C feature.

CACLS
View and modify file ACL's.

CALL
Calls a batch file from another batch file.

CD
Changes directories.

CHCP
Supplement the International keyboard and character set information.

CHDIR
Changes directories.

CHKDSK
Check the hard disk drive running FAT for errors.

CHKNTFS
Check the hard disk drive running NTFS for errors.

CHOICE
Specify a listing of multiple options within a batch file.

CLS
Clears the screen.

CMD
Opens the command interpreter.

COLOR
Easily change the foreground and background color of the MS-DOS window.

COMMAND
Opens the command interpreter.

COMP
Compares files.

COMPACT
Compresses and uncompress files.

CONTROL
Open Control Panel icons from the MS-DOS prompt.

CONVERT
Convert FAT to NTFS.

COPY
Copy one or more files to an alternate location.

CTTY
Change the computers input/output devices.

DATE
View or change the systems date.

DEBUG
Debug utility to create assembly programs to modify hardware settings.

DEFRAG
Re-arrange the hard disk drive to help with loading programs.

DEL
Deletes one or more files.

DELETE
Recovery console command that deletes a file.

DELTREE
Deletes one or more files and/or directories.

DIR
List the contents of one or more directory.

DISABLE
Recovery console command that disables Windows system services or drivers.

DISKCOMP
Compare a disk with another disk.

DISKCOPY
Copy the contents of one disk and place them on another disk.

DOSKEY
Command to view and execute commands that have been run in the past.

DOSSHELL
A GUI to help with early MS-DOS users.

DRIVPARM
Enables overwrite of original device drivers.

ECHO
Displays messages and enables and disables echo.

EDIT
View and edit files.

EDLIN
View and edit files.

EMM386
Load extended Memory Manager.

ENABLE
Recovery console command to enable a disable service or driver.

ENDLOCAL
Stops the localization of the environment changes enabled by the setlocal command.

ERASE
Erase files from computer.

EXIT
Exit from the command interpreter.

EXPAND
Expand a Microsoft Windows file back to it's original format.

EXTRACT
Extract files from the Microsoft Windows cabinets.

FASTHELP
Displays a listing of MS-DOS commands and information about them.

FC
Compare files.

FDISK
Utility used to create partitions on the hard disk drive.

FIND
Search for text within a file.

FINDSTR
Searches for a string of text within a file.

FIXBOOT
Writes a new boot sector.

FIXMBR
Writes a new boot record to a disk drive.

FOR
Boolean used in batch files.

FORMAT
Command to erase and prepare a disk drive.

FTP
Command to connect and operate on a FTP server.

FTYPE
Displays or modifies file types used in file extension associations.

GOTO
Moves a batch file to a specific label or location.

GRAFTABL
Show extended characters in graphics mode.

HELP
Display a listing of commands and brief explanation.

IF
Allows for batch files to perform conditional processing.

IFSHLP.SYS
32-bit file manager.

IPCONFIG
Network command to view network adapter settings and assigned values.

KEYB
Change layout of keyboard.

LABEL
Change the label of a disk drive.

LH
Load a device driver in to high memory.

LISTSVC
Recovery console command that displays the services and drivers.

LOADFIX
Load a program above the first 64k.

LOADHIGH
Load a device driver in to high memory.

LOCK
Lock the hard disk drive.

LOGON
Recovery console command to list installations and enable administrator login.

MAP
Displays the device name of a drive.

MD
Command to create a new directory.

MEM
Display memory on system.

MKDIR
Command to create a new directory.

MODE
Modify the port or display settings.

MORE
Display one page at a time.

MOVE
Move one or more files from one directory to another directory.

MSAV
Early Microsoft Virus scanner.

MSD
Diagnostics utility.

MSCDEX
Utility used to load and provide access to the CD-ROM.

NBTSTAT
Displays protocol statistics and current TCP/IP connections using NBT

NET
Update, fix, or view the network or network settings

NETSH
Configure dynamic and static network information from MS-DOS.

NETSTAT
Display the TCP/IP network protocol statistics and information.

NLSFUNC
Load country specific information.

NSLOOKUP
Look up an IP address of a domain or host on a network.

PATH
View and modify the computers path location.

PATHPING
View and locate locations of network latency.

PAUSE
Command used in batch files to stop the processing of a command.

PING
Test / send information to another network computer or network device.

POPD
Changes to the directory or network path stored by the pushd command.

POWER
Conserve power with computer portables.

PRINT
Prints data to a printer port.

PROMPT
View and change the MS-DOS prompt.

PUSHD
Stores a directory or network path in memory so it can be returned to at any time.

QBASIC
Open the QBasic.

RD
Removes an empty directory.

REN
Renames a file or directory.

RENAME
Renames a file or directory.

RMDIR
Removes an empty directory.

ROUTE
View and configure windows network route tables.

RUNAS
Enables a user to execute a program on another computer.

SCANDISK
Run the scandisk utility.

SCANREG
Scan registry and recover registry from errors.

SET
Change one variable or string to another.

SETLOCAL
Enables local environments to be changed without affecting anything else.

SETVER
Change MS-DOS version to trick older MS-DOS programs.

SHARE
Installs support for file sharing and locking capabilities.

SHIFT
Changes the position of replaceable parameters in a batch program.

SHUTDOWN
Shutdown the computer from the MS-DOS prompt.

SMARTDRV
Create a disk cache in conventional memory or extended memory.

SORT
Sorts the input and displays the output to the screen.

START
Start a separate window in Windows from the MS-DOS prompt.

SUBST
Substitute a folder on your computer for another drive letter.

SWITCHES
Remove add functions from MS-DOS.

SYS
Transfer system files to disk drive.

TELNET
Telnet to another computer / device from the prompt.

TIME
View or modify the system time.

TITLE
Change the title of their MS-DOS window.

TRACERT
Visually view a network packets route across a network.

TREE
View a visual tree of the hard disk drive.

TYPE
Display the contents of a file.

UNDELETE
Undelete a file that has been deleted.

UNFORMAT
Unformat a hard disk drive.

UNLOCK
Unlock a disk drive.

VER
Display the version information.

VERIFY
Enables or disables the feature to determine if files have been written properly.

VOL
Displays the volume information about the designated drive.

XCOPY
Copy multiple files, directories, and/or drives from one location to another.

RUN commands in W-XP

START->RUN->TYPE THE FOLLOWING COMMANDS->ENTER...

1> Accessibility Controls - access.cpl
2> Accessibility Wizard - accwiz
3> Add Hardware Wizard - hdwwiz.cpl
4> Add/Remove Programs - appwiz.cpl
5> Administrative Tools - control admintools
6> Automatic Updates - wuaucpl.cpl
7> Bluetooth Transfer Wizard - fsquirt
8> Calculator - calc
9> Certificate Manager - certmgr.msc
10> Character Map - charmap
11> Check Disk Utility - chkdsk
12> Clipboard Viewer - clipbrd
13> Command Prompt - cmd
14> Component Services - dcomcnfg
15> Computer Management - compmgmt.msc
16> Control Panel - control
17> Date and Time Properties - timedate.cpl
18> DDE Shares - ddeshare
19> Device Manager - devmgmt.msc
20> Direct X Troubleshooter - dxdiag
21> Disk Cleanup Utility - cleanmgr
22> Disk Defragment - dfrg.msc
23> Disk Management - diskmgmt.msc
24> Disk Partition Manager - diskpart
25> Display Properties - control desktop
26> Display Properties - desk.cpl
27> Dr. Watson System Troubleshooting Utility - drwtsn32
28> Driver Verifier Utility - verifier
29> Event Viewer - eventvwr.msc
30> Files and Settings Transfer Tool - migwiz
31> File Signature Verification Tool - sigverif
32> Findfast - findfast.cpl
33> Firefox - firefox
34> Folders Properties - control folders
35> Fonts - control fonts
36> Fonts Folder - fonts
37> Free Cell Card Game - freecell
38> Game Controllers - joy.cpl
39> Group Policy Editor (for xp professional) - gpedit.msc
40> Hearts Card Game - mshearts
41> Help and Support - helpctr
42> HyperTerminal - hypertrm
43> Iexpress Wizard - iexpress
44> Indexing Service - ciadv.msc
45> Internet Connection Wizard - icwconn1
46> Internet Explorer - iexplore
47> Internet Properties - inetcpl.cpl
48> Keyboard Properties - control keyboard
49> Local Security Settings - secpol.msc
50> Local Users and Groups - lusrmgr.msc
51> Logs You Out Of Windows - logoff
52> Malicious Software Removal Tool - mrt
53> Microsoft Chat - winchat
54> Microsoft Movie Maker - moviemk
55> Microsoft Paint - mspaint
56> Microsoft Syncronization Tool - mobsync
57> Minesweeper Game - winmine
58> Mouse Properties - control mouse
59> Mouse Properties - main.cpl
60> Netmeeting - conf
61> Network Connections - control netconnections
62> Network Connections - ncpa.cpl
63> Network Setup Wizard - netsetup.cpl
64> Notepad notepad
65> Object Packager - packager
66> ODBC Data Source Administrator - odbccp32.cpl
67> On Screen Keyboard - osk
68> Outlook Express - msimn
69> Paint - pbrush
70> Password Properties - password.cpl
71> Performance Monitor - perfmon.msc
72> Performance Monitor - perfmon
73> Phone and Modem Options - telephon.cpl
74> Phone Dialer - dialer
75> Pinball Game - pinball
76> Power Configuration - powercfg.cpl
77> Printers and Faxes - control printers
78> Printers Folder - printers
79> Regional Settings - intl.cpl
80> Registry Editor - regedit
81> Registry Editor - regedit32
82> Remote Access Phonebook - rasphone
83> Remote Desktop - mstsc
84> Removable Storage - ntmsmgr.msc
85> Removable Storage Operator Requests - ntmsoprq.msc
86> Resultant Set of Policy (for xp professional) - rsop.msc
87> Scanners and Cameras - sticpl.cpl
88> Scheduled Tasks - control schedtasks
89> Security Center - wscui.cpl
90> Services - services.msc
91> Shared Folders - fsmgmt.msc
92> Shuts Down Windows - shutdown
93> Sounds and Audio - mmsys.cpl
94> Spider Solitare Card Game - spider
95> SQL Client Configuration - cliconfg
96> System Configuration Editor - sysedit
97> System Configuration Utility - msconfig
98> System Information - msinfo32
99> System Properties - sysdm.cpl
100> Task Manager - taskmgr
101> TCP Tester - tcptest
102> Telnet Client - telnet
103> User Account Management - nusrmgr.cpl
104> Utility Manager - utilman
105> Windows Address Book - wab
106> Windows Address Book Import Utility - wabmig
107> WIndows Explorer - explorer
108> Windows Firewall - firewall.cpl
109> Windows Magnifier - magnify
110> Windows Management Infrastructure - wmimgmt.msc
111> Windows Media Player - wmplayer
112> Windows Messenger - msmsgs
113> Windows System Security Tool - syskey
114> Windows Update Launches - wupdmgr
115> Windows Version - winver
116> Windows XP Tour Wizard - tourstart
117> Wordpad - write

REGISTRY BASICS IN XP

The registry is essentially a large hierarchical database, like the file system on your PC. A hierarchical database starts with a single entry at the top, and that entry has multiple sub folders beneath it, and those sub folders each have their own sub folders, and so on.

Although the registry appears to be one seamless unit when viewed in the Registry Editor, it's actually stored in several pieces. Each piece is called a hive. Hives are stored in \Windows\System32\Config, and are named Default, Sam, Security, Software, and System. The main hive files have no extensions; there are also files with the same names but with .sav extensions (backup copies) and .log extensions (log files). When you restore using Last Known Good Configuration, Windows overwrites the .sav versions with the extension-less versions.

There's one additional hive file for the current user, NTUser.dat, stored in the \Documents and Settings\<> folder. It differs from the others both in its location and in that it has an extension. It also does not have a .sav version (although it does have a .log version).

There's not a simple one-to-one relationship between the five top-level categories in the Registry Editor and these locations. However, roughly speaking, the first-level folders within HKEY_LOCAL_MACHINE correspond to the hive files of the same names (Sam, Security, Software, and System), and HKEY_CURRENT_USER is stored in NTUser.dat. HKEY_USERS is stored in Default, and HKEY_CURRENT_CONFIG is stored partly in System and partly in NTUser.dat.
nb:In 9x versions of Microsoft Windows, the entire registry was stored in only two files: System.dat and User.dat.


Understanding Registry Keys
The folders in the left pane of the Registry Editor are called keys . Within various keys are values (and sometimes also sub-keys, which are keys-within-keys). A value has two parts: the value name and the value data.


Try the following experiment to see some values:

1. Navigate to the HKCU\Control Panel key. Notice that there are two values in the right pane. Almost every folder has a value named Default. Usually there's no value data set for it. Notice also that there's a plus sign next to Control Panel, indicating it can be expanded in the left pane to see subkeys.
2.Click the plus sign next to Control Panel, and then click Colors. Values for the colors of various screen elements appear in the right pane. Each color is expressed using the RGB color model, with three numbers between 0 and 255. For example, if the Background is set for 0,78,152, it means 0 red, 78 green, and 152 blue.

3. Double-click one of the values, such as Background. An Edit String dialog box appears, with the color number editable.
4. Click Cancel to close the dialog box without saving changes.
nb:The color values in HKCU\Control Panel\Colors apply only when using the Microsoft Windows Classic style in the display properties, not Microsoft Windows XP style. Therefore, changes made might probably not be immediately apparent in the display.

Types of Registry Values

The Edit String dialog box represents one type of value. Here are the most common value types used in the registry:

* String (REG_SZ): Standard string, used for human-readable letters and numbers.
* Binary (REG_BINARY): Binary numbers (0 or 1) only.
* DWORD (REG_DWORD): Short for "data word," a four-byte number in either decimal, hexadecimal, or binary.

There are many other value types, but you won't be using them much.
nb:You never need to guess as to which type of value to use, because any registry edits you perform will be done from instructions provided that will include the value type.

(The Edit dialog box is different depending with which value type you're working.)


Changing a String Value

Now let's make a simple change to the registry -- change the default download location for Microsoft Internet Explorer. By default, it's the desktop, but you might want to create a special folder for downloads and direct Internet Explorer there.


1. Navigate to HKCU\Software\Microsoft\Internet Explorer.
2. Double-click Download Directory. The Edit String dialog box appears. The default value data set there is the path to your desktop.
3. Change the path to the desired location. For example, lets say, it's set to C:\Temp.
4. Reboot.
5. Go to a Web site where a download is available (such as Download.com) and try downloading an application.

nb:If you make a change to HKCU, and then you can't remember what the original value was, look at the corresponding section in HKU\.DEFAULT, and then update the value in HKCU to match it. HKU\.DEFAULT stores settings on which new user profiles are based, and as such contain the default values for all user-based settings.

Changing a DWORD Value

DWORD values are much like strings except they only accept decimal and hexadecimal numbers.

Here's some practice. This tweak displays the full Windows version on the desktop. This feature was turned on by default in beta versions of Windows to help with testing, but it's off by default in the release product. After turning it on, you might decide you want to turn it off again, and that's fine.

1. In the Registry Editor, navigate to HKEY_CURRENT_USER\Control Panel\Desktop.
2. Double-click PaintDesktopVersion. The Edit DWORD Value dialog box appears.
3. Change the data to 1, and then click OK.
4.To see the change, reboot, or log off and log on again.


Deleting a Value

Next, let's delete a value. Be very careful when you delete from the registry, because if you have the wrong item selected when you press Delete, you could potentially wipe out an important value or key.

For this practice exercise, you'll clear the drop-down list in the Run dialog box, so others can't see which programs you've been running with the Run command.

1. Select Start > Run, and open the drop-down list. Notice that the programs you've recently run appear there. Click Cancel.
2. In the Registry Editor, navigate to HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU.
3. For each value except Default in the right pane, select it and then press Delete to delete it.
4. Reboot. Open the Run dialog box and verify that the program names no longer appear there.


Creating a Value

Now let's do one more. By default, Windows allows only two simultaneous connections when downloading files from Internet Explorer. If you have a fast Internet connection and are connecting to several very slow servers, this limitation can hamper your download capability. In the following tweak, you'll bump that up to 10:

1. Navigate to HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings.
2. Select Edit > New, and then click DWORD Value.
3. The new value appears with a default name. Change it to MaxConnectionsPer1_0Server. If the cursor is not already flashing in the name, press F2 to put it there.
4. Double-click the new value to open its dialog box, and enter A as the hexadecimal value data. (A represents 10 in hex.) Click OK.
5. Select Edit > New and click DWORD Value.
6. The new value appears. Change its name to MaxConnectionsPerServer.
7. Double-click the new value to open its dialog box, and enter A as the hexadecimal value data. Click OK.
8. Reboot.
9. Try downloading multiple files at once from a download site, such as Download.com. You should now be able to start to 10 downloads at once.
NB:Unless you have a fast broadband connection, it's not a good idea to start more than two or three downloads at a time because they start to cut each other's transfer rates and you don't really gain anything; you just increase the likelihood that one of them will time out and have to be restarted.

More Simple Edits to Try


Removing the Shortcut Arrows:
When you create a shortcut on the desktop, it has a little arrow on its icon to indicate that it's indeed a shortcut and not a real file. Most people find this helpful, because it avoids any confusion. However, you can turn off the arrow if you prefer.

open the Registry Editor and open HKEY_CLASSES_ROOT\lnkfile. Rename the value IsShortcut to some other name (such as BackupIsShortcut) to get rid of the arrows. You could delete the value entirely to get the same result, but it's better to rename it in case you decide you want to change back again. Reboot to see the change.
Barricading Folders:
The first time you try to access certain folders using Microsoft Windows Explorer, you get a warning that you should not modify the files there. The Windows folder is one, for example, as is the Program Files folder.

Once you access a folder and bypass that warning, that folder's "barricaded" status is removed. If you want to restore a folder's barricade, for example, in preparation for giving the PC to an inexperienced user, you can do so like this:

1. Navigate to HKEY_CURRENT_USER\Software\Microsoft\Windows\ CurrentVersion\Explorer\WebView\BarricadedFolders. Each folder that can be barricaded appears listed.
2. Double-click a folder to open its Edit DWORD Value box, as shown in Figure 4-11, and then set the value to 1.
3.Repeat for each folder that you want to reset.

Streamlining the Control Panel:

If there are icons in the Control Panel that you never use, you can hide them. This setting affects only the current user, and is completely reversible. Use the Classic view of the Control Panel to see the results.

1. Navigate to HKEY_CURRENT_USER\Control Panel. If there's not already a key called Don't Load, create one. (Select Edit > New > Key.)
2. Create a new string value with the same name as the Control Panel applet you want to hide. Do not set a value for it. The names of the common applets are as follows:

Access.cpl : Accessibility

AppWiz.cpl : Add/Remove Programs

Desk.cpl : Display Properties

Fax.cpl : Microsoft Fax

Hdwwiz.cpl : Add New Hardware

Inetcpl.cpl : Internet Properties

Intl.cpl : Regional Settings Properties

Irprops.cpl : Infrared

Joy.cpl : Joystick

Main.cpl : Mouse Properties

Mmsys.cpl : Multimedia Properties

Modem.cpl : Modem Properties

Netcpl.cpl : Network Properties

Odbccp32.cpl: 32-bit ODBC Data Source Administrator

Password.cpl : Password Properties

Powercfg.cpl : Power Options

Prefscpl.cpl : RealPlayer Preferences

Sysdm.cpl : System Properties

Themes.cpl : Desktop Themes

Telephon.cpl : Phone and Modem Options

Timedate.cpl : Date/Time Properties
NB:To determine the names of other applets, use Search to search for *.cpl, and then double-click an icon and notice what opens.

3. Reboot to see the changes. If you ever want to restore an icon to the Control Panel, simply delete its value in the Don't Load key. You can also run it as a one-time operation by double-clicking its .cpl file.

There r more such tricks...but without proper knowledge playing wid the registry may harm ur pc!!!

REMIX SOFTWARE

Everybody would love to create their own versions of their favourate songs.With the audio DJ Mixer Studio Software u can create ur own remix effects.To download, visit
http://shareme.com/details/free-audio-dj-mixer.html.

FREE DOWNLOAD MANAGER 2.1

Need to increase speed of ur downloads?Then try using the free download manager 2.1.It not only increases download rate by 6 times, but also protects you 4m malicious downloads.To download visit http://shareme.com/details/free-download-manager.html....enjoyyyy fast downloads!!!

ROTATING TAB EFFECT IN FIREFOX 2

If u need to show off some real cool browsing effects to ur buddies,then try on rotating tab effect that works on ur firefox browser.All u hv to do is download this great FIREFOX ADD ON from http://addons.mozilla.org/en-US/firefox/addon/4258 and then just sit back relish all the applauds!!!!

IE7-Many search engines in one!!!

Are u bored of turning to GOOGLE each time u have to look up a term?Then try using DOGPILE(www.dogpile.com) to power boost ur searches with a host of search engines like MSN,YAHOO,ASK and even GOOGLE all integrated in one.so even if u happen to be a google addict,u can still get an advanced search without foresaking the benefits of ur favourate search engines.......

DISPLAY UR MUSIC ONLINE!!!

You can allow others to see what u r listening to in MSN messenger.This is possible if u r using Windows media player to listen to ur music.To display ur music log on to MSN messenger.Click on the drop down menu below the availability status box.To display the music u r currently listening to,click on "TURN ON WHAT I M LISTENING TO".Go to "Tools->options".Click on "SHOW SONG INFORMATION 4M WINDOWS MEDIA PLAYER AS A PERSONAL MESSAGE".Thats it!!!!U r done!!!!!

A simple way to hack! You should know to stay safe!

Apart from the other tough ways like fake login & tiring processes like brute forces one can apply a very simple way to hack any email account may be yahoo,gmail or an orkut account...

what u have to do is just install a keylogger to the system & hide it from the user using the built in hiding features..one of the keylogger satisfying the needs is KGP keylogger.you can download the trial version from the link http://www.refog.com/free-keylogger/key-logger.html.

Now what the keylogger does is that it notes every keystroke typed on the keyboard.Thus when the victim writes his/her password you can easily detect it in the keylogger's records.....whooosh..u can now easily hack the account!!!!


but hey if u r an ethical hacker,u should also know how to prevent urself by being hacked through this way..POST YOUR COMMENTS IF U LIKE TO KNOW IT!!!

ENJOY FM IN GTALK

For this u need to follow these steps...,

1) add this id in ur GTalk: service@gtalk2voip.com
2) than add: 110@radio.gtalk2voip.com

3)
Then make a cal to 110@radio.gtalk2voip.com than u wil be directly connected to teen taal FM radio station.




LIST OF AVAILABLE RADIO STATIONS:
100 - Classic Country Music from Heartland Public Radio [http://128.177.3.80:4064/]
101 - Cowboy Cultural Society Radio - an American tradition since 2002 [http://205.188.215.232:8028/]
102 - Atlantic Sound Factory - ASF Radio [http://69.31.50.146:80/]
103 - 100.7 Jack FM, San Diego [http://38.116.132.31:9024/]
104 - 102.7 FM The Fringe [http://64.72.124.89:8134/]
105 - 181.fm - The Buzz (Your Alternative Station!) [http://scfire-nyk0l-1.stream.aol.com:80/stream/1022]
106 - 181.fm - The Mix Channel (70s, 80s, 90s and Today's Best Music) [http://208.53.158.167:8032/]
107 - 181.fm - The Eagle (Your Home For REAL Classic Rock!) [http://208.53.158.126:8030/]
108 - .977 The 80s Channel [http://scfire-ntc0l-2.stream.aol.com:80/stream/1040]
109 - 1.FM - Channel X [http://209.51.161.54:8072/]
201 - KCRW World News [http://scfire-ntc0l-2.stream.aol.com:80/stream/1047]
202 - Sporting News Radio [http://scfire-chi0l-2.stream.aol.com:80/stream/1057]
203 - KPFK - Southern California's 90.7 FM News, Talk & Music [http://64.27.31.66:80/]
204 - WBUR 90.9 FM, Boston's NPR News Station [http://205.234.188.21:80/]


enjoyyyyyyyyy!!!!!!!!!!!

FIX MEMORY LEAK IN FIREFOX BROWSER

FOLLOW THE GIVEN STEPS:

1. Open Firefox,Type "about:config" without quotes into the address bar and hit enter/click Go.



2. Right-click anywhere,select New, then Integer. In the dialog prompt that appears, type:

browser.cache.memory.capacity




3. Click OK. Another dialog prompt will appear. This is where you decide how much memory to allocate to Firefox. This depends on how much RAM your computer has, but generally you don't want to allocate too little (under 8MB), but if you allocate too much, you might as well not do this. A good recommended setting is 16MB. If you want 16MB, enter this value into the dialog prompt:

16384

(Why 16384 instead of 16000?
Because computers use base-12 counting. Thus 16 megabytes = 16384 bytes. Likewise, if you want to double that and allocate 32MB, you'd enter 32768.
)

4. Click OK to close the dialog box, then close all instances of Firefox and restart. If your Firefox still uses the same amount of memory, give it a few minutes and it should slowly clear up. If that fails, try a system reboot.

send an email 4m any1s id

You can send an email to your friend from somebody else's email id or may be your frnz email id.
Follow the following steps:
1>Type The Name Of the person on behalf of whom you want to send the email.
2>Type Email To Be Shown
3>Now don't type anything in next 2 boxes(You may get screwed if you type in)
4>Type Recipient's(person whom you want to send the email) name in the next box.
5>Write the subject n Message Body.
6>Click send n you are done

Scattersearch with Yahoo! and Google

Sometimes, illuminating results can be found when scraping from one site and feeding the results into the API of another. With scattersearching, one can narrow down the most popular related results, as suggested by Yahoo! and Google

Yahoo! has a "Related searches" feature, where you enter a search term and get a list of related terms under the search box, if any are available. This hack scrapes those related terms and performs a Google search for the related terms in the title. It then returns the count for those searches, along with a direct link to the results. Aside from showing how scraped and API-generated data can live together in harmony, this hack is good to use when you're exploring concepts; for example, you might know that something called Pokemon exists, but you might not know anything about it. You'll get Yahoo!'s related searches and an idea of how many results each of those searches generates in Google. From there, you can choose the search terms that generate the most results or look the most promising based on your limited knowledge, or you can simply pick a road that appears less traveled.

Save the following code to a file called scattersearch.pl.


#!/usr/bin/perl -w # # Scattersearch -- Use the search suggestions from # Yahoo! to build a series of intitle: searches at Google. use strict; use LWP; use SOAP::Lite; use CGI qw/:standard/; # Get our query, else die miserably. my $query = shift @ARGV; die unless $query; # Your Google API developer's key. my $google_key = 'insert key here'; # Location of the GoogleSearch WSDL file. my $google_wdsl = "./GoogleSearch.wsdl"; # Search Yahoo! for the query. my $ua = LWP::UserAgent->new; my $url = URI->new('http://search.yahoo.com/search'); $url->query_form(rs => "more", p => $query); my $yahoosearch = $ua->get($url)->content; $yahoosearch =~ s/[\f\t\n\r]//isg; # And determine if there were any results. $yahoosearch =~ m!Also try:(.*?) !migs; die "Sorry, there were no results!\n" unless $1; my $recommended = $1; # Now, add all our results into # an array for Google processing. my @googlequeries; while ($recommended =~ m!(.*?)!mgis) { my $searchitem = $1; $searchitem =~ s/nobr<[^>]*>\///g; print "$searchitem\n"; push (@googlequeries, $searchitem); } # Print our header for the results page. print join "\n", start_html("ScatterSearch"); h1("Your Scattersearch Results"), p("Your original search term was '$query'"), p("That search had " . scalar(@googlequeries). " recommended terms."), p("Here are result numbers from a Google search"), CGI::start_ol( ); # Create our Google object for API searches. my $gsrch = SOAP::Lite->service("file:$google_wdsl"); # Running the actual Google queries. foreach my $googlesearch (@googlequeries) { my $titlesearch = "allintitle:$googlesearch"; my $count = $gsrch->doGoogleSearch($google_key, $titlesearch, 0, 1, "false", "", "false", "", "", ""); my $url = $googlesearch; $url =~ s/ /+/g; $url =~ s/\"/%22/g; print li("There were $count->{estimatedTotalResultsCount} ". "results for the recommended search $googlesearch"); } print CGI::end_ol( ), end_html;


Running the Hack
This script generates an HTML file, ready for you to upload to a publicly accessible web site. If you want to save the output of a search for siamese to a file called scattersearch.html in your Sites directory, run the following command ["How to Run the Hacks" in the Preface]:


% perl scattersearch.pl "siamese" > ~/Sites/scattersearch.html


Hacking the Hack
You have two choices: you can either hack the interaction with Yahoo! or expand it to include something in addition to or instead of Yahoo! itself. Let's look at Yahoo! first. If you take a close look at the code, you'll see we're passing an unusual parameter to our Yahoo! search results page:
$url->query_form(rs => "more", p => $query);
The rs=>"more" part of the search shows the related search terms. Getting the related search this way will show up to 10 results. If you remove that portion of the code, you'll get roughly four related searches when they're available. That might suit you if you want only a few, but perhaps you want dozens and dozens! In that case, replace more with all.